oci-vnmonitoring 2.76.1 → 2.77.1

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (213) hide show
  1. package/lib/client.d.ts +19 -13
  2. package/lib/client.js +21 -12
  3. package/lib/client.js.map +1 -1
  4. package/lib/model/add-drg-route-rule-details.d.ts +3 -3
  5. package/lib/model/add-public-ip-pool-capacity-details.d.ts +3 -3
  6. package/lib/model/add-security-rule-details.d.ts +21 -21
  7. package/lib/model/add-subnet-ipv6-cidr-details.d.ts +1 -1
  8. package/lib/model/add-vcn-ipv6-cidr-details.d.ts +1 -1
  9. package/lib/model/bgp-session-info.d.ts +15 -15
  10. package/lib/model/byoip-allocated-range-collection.d.ts +1 -1
  11. package/lib/model/byoip-range-collection.d.ts +2 -2
  12. package/lib/model/byoip-range-summary.d.ts +9 -9
  13. package/lib/model/byoip-range-vcn-ipv6-allocation-summary.d.ts +3 -3
  14. package/lib/model/byoip-range.d.ts +15 -15
  15. package/lib/model/byoipv6-cidr-details.d.ts +3 -3
  16. package/lib/model/capture-filter.d.ts +3 -3
  17. package/lib/model/change-path-analyzer-test-compartment-details.d.ts +2 -2
  18. package/lib/model/compute-instance-endpoint.d.ts +2 -2
  19. package/lib/model/connect-remote-peering-connections-details.d.ts +1 -1
  20. package/lib/model/cpe-device-config-answer.d.ts +2 -2
  21. package/lib/model/cpe.d.ts +5 -5
  22. package/lib/model/create-byoip-range-details.d.ts +4 -4
  23. package/lib/model/create-capture-filter-details.d.ts +2 -2
  24. package/lib/model/create-cpe-details.d.ts +4 -4
  25. package/lib/model/create-cross-connect-details.d.ts +4 -4
  26. package/lib/model/create-cross-connect-group-details.d.ts +2 -2
  27. package/lib/model/create-dhcp-details.d.ts +2 -2
  28. package/lib/model/create-drg-attachment-details.d.ts +3 -3
  29. package/lib/model/create-drg-details.d.ts +2 -2
  30. package/lib/model/create-drg-route-distribution-details.d.ts +2 -2
  31. package/lib/model/create-drg-route-table-details.d.ts +2 -2
  32. package/lib/model/create-internet-gateway-details.d.ts +2 -2
  33. package/lib/model/create-ip-sec-connection-details.d.ts +12 -12
  34. package/lib/model/create-ip-sec-connection-tunnel-details.d.ts +3 -3
  35. package/lib/model/create-ip-sec-tunnel-bgp-session-details.d.ts +15 -15
  36. package/lib/model/create-ipv6-details.d.ts +4 -4
  37. package/lib/model/create-local-peering-gateway-details.d.ts +2 -2
  38. package/lib/model/create-nat-gateway-details.d.ts +4 -4
  39. package/lib/model/create-network-security-group-details.d.ts +2 -2
  40. package/lib/model/create-path-analyzer-test-details.d.ts +5 -5
  41. package/lib/model/create-private-ip-details.d.ts +5 -5
  42. package/lib/model/create-public-ip-details.d.ts +2 -2
  43. package/lib/model/create-public-ip-pool-details.d.ts +2 -2
  44. package/lib/model/create-remote-peering-connection-details.d.ts +2 -2
  45. package/lib/model/create-route-table-details.d.ts +2 -2
  46. package/lib/model/create-security-list-details.d.ts +2 -2
  47. package/lib/model/create-service-gateway-details.d.ts +4 -4
  48. package/lib/model/create-subnet-details.d.ts +14 -14
  49. package/lib/model/create-vcn-details.d.ts +11 -11
  50. package/lib/model/create-virtual-circuit-details.d.ts +13 -13
  51. package/lib/model/create-vlan-details.d.ts +4 -4
  52. package/lib/model/create-vnic-details.d.ts +24 -24
  53. package/lib/model/create-vtap-details.d.ts +7 -7
  54. package/lib/model/cross-connect-group.d.ts +4 -4
  55. package/lib/model/cross-connect-location.d.ts +1 -1
  56. package/lib/model/cross-connect-mapping-details.d.ts +6 -6
  57. package/lib/model/cross-connect-mapping.d.ts +7 -7
  58. package/lib/model/cross-connect-port-speed-shape.d.ts +2 -2
  59. package/lib/model/cross-connect-status.d.ts +2 -2
  60. package/lib/model/cross-connect.d.ts +5 -5
  61. package/lib/model/dhcp-dns-option.d.ts +1 -1
  62. package/lib/model/dhcp-options.d.ts +3 -3
  63. package/lib/model/dhcp-search-domain-option.d.ts +2 -2
  64. package/lib/model/drg-attachment-info.d.ts +1 -1
  65. package/lib/model/drg-attachment.d.ts +6 -6
  66. package/lib/model/drg-route-distribution-statement.d.ts +1 -1
  67. package/lib/model/drg-route-distribution.d.ts +4 -4
  68. package/lib/model/drg-route-rule.d.ts +10 -10
  69. package/lib/model/drg-route-table.d.ts +4 -4
  70. package/lib/model/drg.d.ts +3 -3
  71. package/lib/model/egress-security-rule.d.ts +9 -9
  72. package/lib/model/endpoint.d.ts +1 -1
  73. package/lib/model/fast-connect-provider-service-key.d.ts +2 -2
  74. package/lib/model/fast-connect-provider-service.d.ts +1 -1
  75. package/lib/model/flow-log-capture-filter-rule-details.d.ts +1 -1
  76. package/lib/model/i-psec-connection-device-status.d.ts +1 -1
  77. package/lib/model/i-psec-connection-tunnel.d.ts +7 -7
  78. package/lib/model/i-psec-connection.d.ts +14 -14
  79. package/lib/model/icmp-traffic-protocol-parameters.d.ts +1 -1
  80. package/lib/model/ingress-security-rule.d.ts +9 -9
  81. package/lib/model/internet-gateway.d.ts +3 -3
  82. package/lib/model/ip-address-endpoint.d.ts +2 -2
  83. package/lib/model/ipv6.d.ts +7 -7
  84. package/lib/model/letter-of-authority.d.ts +1 -1
  85. package/lib/model/load-balancer-endpoint.d.ts +1 -1
  86. package/lib/model/load-balancer-listener-endpoint.d.ts +1 -1
  87. package/lib/model/local-peering-gateway.d.ts +11 -11
  88. package/lib/model/macsec-key.d.ts +1 -1
  89. package/lib/model/nat-gateway.d.ts +5 -5
  90. package/lib/model/network-load-balancer-endpoint.d.ts +1 -1
  91. package/lib/model/network-load-balancer-listener-endpoint.d.ts +1 -1
  92. package/lib/model/network-security-group-vnic.d.ts +1 -1
  93. package/lib/model/network-security-group.d.ts +3 -3
  94. package/lib/model/path-analysis-work-request-result.d.ts +2 -2
  95. package/lib/model/path-analyzer-test-collection.d.ts +2 -2
  96. package/lib/model/path-analyzer-test-summary.d.ts +9 -9
  97. package/lib/model/path-analyzer-test.d.ts +9 -9
  98. package/lib/model/path.d.ts +1 -1
  99. package/lib/model/persisted-get-path-analysis-details.d.ts +2 -2
  100. package/lib/model/private-ip.d.ts +21 -21
  101. package/lib/model/protocol-parameters.d.ts +1 -1
  102. package/lib/model/public-ip-pool-collection.d.ts +1 -1
  103. package/lib/model/public-ip-pool-summary.d.ts +3 -3
  104. package/lib/model/public-ip-pool.d.ts +3 -3
  105. package/lib/model/public-ip.d.ts +17 -17
  106. package/lib/model/query-options.d.ts +1 -1
  107. package/lib/model/remote-peering-connection.d.ts +7 -7
  108. package/lib/model/remove-public-ip-pool-capacity-details.d.ts +1 -1
  109. package/lib/model/remove-subnet-ipv6-cidr-details.d.ts +1 -1
  110. package/lib/model/remove-vcn-ipv6-cidr-details.d.ts +1 -1
  111. package/lib/model/route-rule.d.ts +13 -13
  112. package/lib/model/route-table.d.ts +4 -4
  113. package/lib/model/security-action.d.ts +1 -1
  114. package/lib/model/security-list.d.ts +3 -3
  115. package/lib/model/security-rule.d.ts +26 -26
  116. package/lib/model/service-gateway.d.ts +7 -7
  117. package/lib/model/service.d.ts +10 -10
  118. package/lib/model/subnet-endpoint.d.ts +2 -2
  119. package/lib/model/subnet.d.ts +21 -21
  120. package/lib/model/tcp-protocol-parameters.d.ts +2 -2
  121. package/lib/model/tcp-traffic-protocol-parameters.d.ts +3 -3
  122. package/lib/model/topology-associated-with-entity-relationship.d.ts +2 -2
  123. package/lib/model/topology-associated-with-relationship-details.d.ts +1 -1
  124. package/lib/model/topology-contains-entity-relationship.d.ts +2 -2
  125. package/lib/model/topology-routes-to-entity-relationship.d.ts +1 -1
  126. package/lib/model/topology-routes-to-relationship-details.d.ts +5 -5
  127. package/lib/model/topology.d.ts +1 -1
  128. package/lib/model/traffic-node.d.ts +1 -1
  129. package/lib/model/traffic-protocol-parameters.d.ts +1 -1
  130. package/lib/model/traffic-route.d.ts +1 -1
  131. package/lib/model/tunnel-config.d.ts +2 -2
  132. package/lib/model/tunnel-cpe-device-config.d.ts +1 -1
  133. package/lib/model/tunnel-phase-one-details.d.ts +1 -1
  134. package/lib/model/tunnel-phase-two-details.d.ts +1 -1
  135. package/lib/model/tunnel-security-association-summary.d.ts +1 -1
  136. package/lib/model/tunnel-status.d.ts +3 -3
  137. package/lib/model/udp-protocol-parameters.d.ts +2 -2
  138. package/lib/model/udp-traffic-protocol-parameters.d.ts +3 -3
  139. package/lib/model/update-byoip-range-details.d.ts +3 -3
  140. package/lib/model/update-capture-filter-details.d.ts +2 -2
  141. package/lib/model/update-cpe-details.d.ts +2 -2
  142. package/lib/model/update-cross-connect-details.d.ts +3 -3
  143. package/lib/model/update-cross-connect-group-details.d.ts +2 -2
  144. package/lib/model/update-dhcp-details.d.ts +2 -2
  145. package/lib/model/update-drg-attachment-details.d.ts +2 -2
  146. package/lib/model/update-drg-details.d.ts +2 -2
  147. package/lib/model/update-drg-route-distribution-details.d.ts +2 -2
  148. package/lib/model/update-drg-route-rule-details.d.ts +3 -3
  149. package/lib/model/update-drg-route-table-details.d.ts +2 -2
  150. package/lib/model/update-internet-gateway-details.d.ts +2 -2
  151. package/lib/model/update-ip-sec-connection-details.d.ts +8 -8
  152. package/lib/model/update-ip-sec-connection-tunnel-details.d.ts +3 -3
  153. package/lib/model/update-ip-sec-tunnel-bgp-session-details.d.ts +16 -16
  154. package/lib/model/update-ipv6-details.d.ts +2 -2
  155. package/lib/model/update-local-peering-gateway-details.d.ts +2 -2
  156. package/lib/model/update-nat-gateway-details.d.ts +4 -4
  157. package/lib/model/update-network-security-group-details.d.ts +2 -2
  158. package/lib/model/update-path-analyzer-test-details.d.ts +4 -4
  159. package/lib/model/update-private-ip-details.d.ts +4 -4
  160. package/lib/model/update-public-ip-details.d.ts +2 -2
  161. package/lib/model/update-public-ip-pool-details.d.ts +2 -2
  162. package/lib/model/update-remote-peering-connection-details.d.ts +2 -2
  163. package/lib/model/update-route-table-details.d.ts +2 -2
  164. package/lib/model/update-security-list-details.d.ts +2 -2
  165. package/lib/model/update-security-rule-details.d.ts +23 -23
  166. package/lib/model/update-service-gateway-details.d.ts +8 -8
  167. package/lib/model/update-subnet-details.d.ts +5 -5
  168. package/lib/model/update-vcn-details.d.ts +2 -2
  169. package/lib/model/update-virtual-circuit-details.d.ts +7 -7
  170. package/lib/model/update-vlan-details.d.ts +3 -3
  171. package/lib/model/update-vnic-details.d.ts +7 -7
  172. package/lib/model/update-vtap-details.d.ts +5 -5
  173. package/lib/model/upgrade-status.d.ts +1 -1
  174. package/lib/model/vcn.d.ts +8 -8
  175. package/lib/model/virtual-circuit-bandwidth-shape.d.ts +2 -2
  176. package/lib/model/virtual-circuit-drg-attachment-network-details.d.ts +1 -1
  177. package/lib/model/virtual-circuit-public-prefix.d.ts +2 -2
  178. package/lib/model/virtual-circuit.d.ts +11 -11
  179. package/lib/model/vlan-endpoint.d.ts +2 -2
  180. package/lib/model/vlan.d.ts +6 -6
  181. package/lib/model/vnic-endpoint.d.ts +2 -2
  182. package/lib/model/vnic.d.ts +16 -16
  183. package/lib/model/vtap.d.ts +8 -8
  184. package/lib/model/work-request-error-collection.d.ts +2 -2
  185. package/lib/model/work-request-log-entry-collection.d.ts +1 -1
  186. package/lib/model/work-request-resource.d.ts +3 -3
  187. package/lib/model/work-request-result-collection.d.ts +2 -2
  188. package/lib/model/work-request-summary-collection.d.ts +2 -2
  189. package/lib/model/work-request-summary.d.ts +2 -2
  190. package/lib/model/work-request.d.ts +2 -2
  191. package/lib/request/change-path-analyzer-test-compartment-request.d.ts +3 -3
  192. package/lib/request/create-path-analyzer-test-request.d.ts +1 -1
  193. package/lib/request/delete-path-analyzer-test-request.d.ts +3 -3
  194. package/lib/request/get-path-analysis-request.d.ts +1 -1
  195. package/lib/request/get-path-analyzer-test-request.d.ts +2 -2
  196. package/lib/request/get-work-request-request.d.ts +1 -1
  197. package/lib/request/list-path-analyzer-tests-request.d.ts +7 -7
  198. package/lib/request/list-work-request-errors-request.d.ts +5 -5
  199. package/lib/request/list-work-request-logs-request.d.ts +5 -5
  200. package/lib/request/list-work-request-results-request.d.ts +3 -3
  201. package/lib/request/list-work-requests-request.d.ts +6 -6
  202. package/lib/request/update-path-analyzer-test-request.d.ts +3 -3
  203. package/lib/response/change-path-analyzer-test-compartment-response.d.ts +1 -1
  204. package/lib/response/create-path-analyzer-test-response.d.ts +1 -1
  205. package/lib/response/get-path-analyzer-test-response.d.ts +1 -1
  206. package/lib/response/get-work-request-response.d.ts +1 -1
  207. package/lib/response/list-path-analyzer-tests-response.d.ts +1 -1
  208. package/lib/response/list-work-request-errors-response.d.ts +1 -1
  209. package/lib/response/list-work-request-logs-response.d.ts +1 -1
  210. package/lib/response/list-work-request-results-response.d.ts +1 -1
  211. package/lib/response/list-work-requests-response.d.ts +1 -1
  212. package/lib/response/update-path-analyzer-test-response.d.ts +1 -1
  213. package/package.json +3 -3
@@ -18,7 +18,7 @@ documentation for the [Network Path Analyzer](/iaas/Content/Network/Concepts/pat
18
18
  export interface UpdatePublicIpPoolDetails {
19
19
  /**
20
20
  * Defined tags for this resource. Each key is predefined and scoped to a namespace.
21
- * Example: `{\"foo-namespace\": {\"bar-key\": \"value\"}}`
21
+ * Example: {@code {\"foo-namespace\": {\"bar-key\": \"value\"}}}
22
22
  *
23
23
  */
24
24
  "definedTags"?: {
@@ -34,7 +34,7 @@ export interface UpdatePublicIpPoolDetails {
34
34
  "displayName"?: string;
35
35
  /**
36
36
  * Simple key-value pair that is applied without any predefined name, type or scope. Exists for cross-compatibility only.
37
- * Example: `{\"bar-key\": \"value\"}`
37
+ * Example: {@code {\"bar-key\": \"value\"}}
38
38
  *
39
39
  */
40
40
  "freeformTags"?: {
@@ -15,7 +15,7 @@ documentation for the [Network Path Analyzer](/iaas/Content/Network/Concepts/pat
15
15
  export interface UpdateRemotePeeringConnectionDetails {
16
16
  /**
17
17
  * Defined tags for this resource. Each key is predefined and scoped to a namespace.
18
- * Example: `{\"foo-namespace\": {\"bar-key\": \"value\"}}`
18
+ * Example: {@code {\"foo-namespace\": {\"bar-key\": \"value\"}}}
19
19
  *
20
20
  */
21
21
  "definedTags"?: {
@@ -31,7 +31,7 @@ export interface UpdateRemotePeeringConnectionDetails {
31
31
  "displayName"?: string;
32
32
  /**
33
33
  * Simple key-value pair that is applied without any predefined name, type or scope. Exists for cross-compatibility only.
34
- * Example: `{\"bar-key\": \"value\"}`
34
+ * Example: {@code {\"bar-key\": \"value\"}}
35
35
  *
36
36
  */
37
37
  "freeformTags"?: {
@@ -16,7 +16,7 @@ import * as model from "../model";
16
16
  export interface UpdateRouteTableDetails {
17
17
  /**
18
18
  * Defined tags for this resource. Each key is predefined and scoped to a namespace.
19
- * Example: `{\"foo-namespace\": {\"bar-key\": \"value\"}}`
19
+ * Example: {@code {\"foo-namespace\": {\"bar-key\": \"value\"}}}
20
20
  *
21
21
  */
22
22
  "definedTags"?: {
@@ -32,7 +32,7 @@ export interface UpdateRouteTableDetails {
32
32
  "displayName"?: string;
33
33
  /**
34
34
  * Simple key-value pair that is applied without any predefined name, type or scope. Exists for cross-compatibility only.
35
- * Example: `{\"bar-key\": \"value\"}`
35
+ * Example: {@code {\"bar-key\": \"value\"}}
36
36
  *
37
37
  */
38
38
  "freeformTags"?: {
@@ -16,7 +16,7 @@ import * as model from "../model";
16
16
  export interface UpdateSecurityListDetails {
17
17
  /**
18
18
  * Defined tags for this resource. Each key is predefined and scoped to a namespace.
19
- * Example: `{\"foo-namespace\": {\"bar-key\": \"value\"}}`
19
+ * Example: {@code {\"foo-namespace\": {\"bar-key\": \"value\"}}}
20
20
  *
21
21
  */
22
22
  "definedTags"?: {
@@ -36,7 +36,7 @@ export interface UpdateSecurityListDetails {
36
36
  "egressSecurityRules"?: Array<model.EgressSecurityRule>;
37
37
  /**
38
38
  * Simple key-value pair that is applied without any predefined name, type or scope. Exists for cross-compatibility only.
39
- * Example: `{\"bar-key\": \"value\"}`
39
+ * Example: {@code {\"bar-key\": \"value\"}}
40
40
  *
41
41
  */
42
42
  "freeformTags"?: {
@@ -14,7 +14,7 @@ documentation for the [Network Path Analyzer](/iaas/Content/Network/Concepts/pat
14
14
  */
15
15
  import * as model from "../model";
16
16
  /**
17
- * A rule for allowing inbound (`direction`= INGRESS) or outbound (`direction`= EGRESS) IP packets.
17
+ * A rule for allowing inbound ({@code direction}= INGRESS) or outbound ({@code direction}= EGRESS) IP packets.
18
18
  *
19
19
  */
20
20
  export interface UpdateSecurityRuleDetails {
@@ -29,13 +29,13 @@ export interface UpdateSecurityRuleDetails {
29
29
  * <p>
30
30
  Allowed values:
31
31
  * <p>
32
- * An IP address range in CIDR notation. For example: `192.168.1.0/24` or `2001:0db8:0123:45::/56`
32
+ * An IP address range in CIDR notation. For example: {@code 192.168.1.0/24} or {@code 2001:0db8:0123:45::/56}
33
33
  * IPv6 addressing is supported for all commercial and government regions. See
34
34
  * [IPv6 Addresses](https://docs.cloud.oracle.com/iaas/Content/Network/Concepts/ipv6.htm).
35
35
  * <p>
36
- * The `cidrBlock` value for a {@link Service}, if you're
37
- * setting up a security rule for traffic destined for a particular `Service` through
38
- * a service gateway. For example: `oci-phx-objectstorage`.
36
+ * The {@code cidrBlock} value for a {@link Service}, if you're
37
+ * setting up a security rule for traffic destined for a particular {@code Service} through
38
+ * a service gateway. For example: {@code oci-phx-objectstorage}.
39
39
  * <p>
40
40
  * The [OCID](https://docs.cloud.oracle.com/iaas/Content/General/Concepts/identifiers.htm) of a {@link NetworkSecurityGroup} in the same
41
41
  * VCN. The value can be the NSG that the rule belongs to if the rule's intent is to control
@@ -44,24 +44,24 @@ export interface UpdateSecurityRuleDetails {
44
44
  */
45
45
  "destination"?: string;
46
46
  /**
47
- * Type of destination for the rule. Required if `direction` = `EGRESS`.
47
+ * Type of destination for the rule. Required if {@code direction} = {@code EGRESS}.
48
48
  * <p>
49
49
  Allowed values:
50
50
  * <p>
51
- * `CIDR_BLOCK`: If the rule's `destination` is an IP address range in CIDR notation.
51
+ * {@code CIDR_BLOCK}: If the rule's {@code destination} is an IP address range in CIDR notation.
52
52
  * <p>
53
- * `SERVICE_CIDR_BLOCK`: If the rule's `destination` is the `cidrBlock` value for a
53
+ * {@code SERVICE_CIDR_BLOCK}: If the rule's {@code destination} is the {@code cidrBlock} value for a
54
54
  * {@link Service} (the rule is for traffic destined for a
55
- * particular `Service` through a service gateway).
55
+ * particular {@code Service} through a service gateway).
56
56
  * <p>
57
- * `NETWORK_SECURITY_GROUP`: If the rule's `destination` is the [OCID](https://docs.cloud.oracle.com/iaas/Content/General/Concepts/identifiers.htm) of a
57
+ * {@code NETWORK_SECURITY_GROUP}: If the rule's {@code destination} is the [OCID](https://docs.cloud.oracle.com/iaas/Content/General/Concepts/identifiers.htm) of a
58
58
  * {@link NetworkSecurityGroup}.
59
59
  *
60
60
  */
61
61
  "destinationType"?: UpdateSecurityRuleDetails.DestinationType;
62
62
  /**
63
- * Direction of the security rule. Set to `EGRESS` for rules to allow outbound IP packets,
64
- * or `INGRESS` for rules to allow inbound IP packets.
63
+ * Direction of the security rule. Set to {@code EGRESS} for rules to allow outbound IP packets,
64
+ * or {@code INGRESS} for rules to allow inbound IP packets.
65
65
  *
66
66
  */
67
67
  "direction": UpdateSecurityRuleDetails.Direction;
@@ -69,7 +69,7 @@ export interface UpdateSecurityRuleDetails {
69
69
  /**
70
70
  * The Oracle-assigned ID of the security rule that you want to update. You can't change this value.
71
71
  * <p>
72
- Example: `04ABEC`
72
+ Example: {@code 04ABEC}
73
73
  *
74
74
  */
75
75
  "id": string;
@@ -83,7 +83,7 @@ export interface UpdateSecurityRuleDetails {
83
83
  */
84
84
  "isStateless"?: boolean;
85
85
  /**
86
- * The transport protocol. Specify either `all` or an IPv4 protocol number as
86
+ * The transport protocol. Specify either {@code all} or an IPv4 protocol number as
87
87
  * defined in
88
88
  * [Protocol Numbers](http://www.iana.org/assignments/protocol-numbers/protocol-numbers.xhtml).
89
89
  * Options are supported only for ICMP (\"1\"), TCP (\"6\"), UDP (\"17\"), and ICMPv6 (\"58\").
@@ -96,13 +96,13 @@ export interface UpdateSecurityRuleDetails {
96
96
  * <p>
97
97
  Allowed values:
98
98
  * <p>
99
- * An IP address range in CIDR notation. For example: `192.168.1.0/24` or `2001:0db8:0123:45::/56`
99
+ * An IP address range in CIDR notation. For example: {@code 192.168.1.0/24} or {@code 2001:0db8:0123:45::/56}
100
100
  * IPv6 addressing is supported for all commercial and government regions. See
101
101
  * [IPv6 Addresses](https://docs.cloud.oracle.com/iaas/Content/Network/Concepts/ipv6.htm).
102
102
  * <p>
103
- * The `cidrBlock` value for a {@link Service}, if you're
104
- * setting up a security rule for traffic coming from a particular `Service` through
105
- * a service gateway. For example: `oci-phx-objectstorage`.
103
+ * The {@code cidrBlock} value for a {@link Service}, if you're
104
+ * setting up a security rule for traffic coming from a particular {@code Service} through
105
+ * a service gateway. For example: {@code oci-phx-objectstorage}.
106
106
  * <p>
107
107
  * The [OCID](https://docs.cloud.oracle.com/iaas/Content/General/Concepts/identifiers.htm) of a {@link NetworkSecurityGroup} in the same
108
108
  * VCN. The value can be the NSG that the rule belongs to if the rule's intent is to control
@@ -111,15 +111,15 @@ export interface UpdateSecurityRuleDetails {
111
111
  */
112
112
  "source"?: string;
113
113
  /**
114
- * Type of source for the rule. Required if `direction` = `INGRESS`.
114
+ * Type of source for the rule. Required if {@code direction} = {@code INGRESS}.
115
115
  * <p>
116
- * `CIDR_BLOCK`: If the rule's `source` is an IP address range in CIDR notation.
116
+ * {@code CIDR_BLOCK}: If the rule's {@code source} is an IP address range in CIDR notation.
117
117
  * <p>
118
- * `SERVICE_CIDR_BLOCK`: If the rule's `source` is the `cidrBlock` value for a
118
+ * {@code SERVICE_CIDR_BLOCK}: If the rule's {@code source} is the {@code cidrBlock} value for a
119
119
  * {@link Service} (the rule is for traffic coming from a
120
- * particular `Service` through a service gateway).
120
+ * particular {@code Service} through a service gateway).
121
121
  * <p>
122
- * `NETWORK_SECURITY_GROUP`: If the rule's `source` is the [OCID](https://docs.cloud.oracle.com/iaas/Content/General/Concepts/identifiers.htm) of a
122
+ * {@code NETWORK_SECURITY_GROUP}: If the rule's {@code source} is the [OCID](https://docs.cloud.oracle.com/iaas/Content/General/Concepts/identifiers.htm) of a
123
123
  * {@link NetworkSecurityGroup}.
124
124
  *
125
125
  */
@@ -15,16 +15,16 @@ documentation for the [Network Path Analyzer](/iaas/Content/Network/Concepts/pat
15
15
  import * as model from "../model";
16
16
  export interface UpdateServiceGatewayDetails {
17
17
  /**
18
- * Whether the service gateway blocks all traffic through it. The default is `false`. When
19
- * this is `true`, traffic is not routed to any services, regardless of route rules.
18
+ * Whether the service gateway blocks all traffic through it. The default is {@code false}. When
19
+ * this is {@code true}, traffic is not routed to any services, regardless of route rules.
20
20
  * <p>
21
- Example: `true`
21
+ Example: {@code true}
22
22
  *
23
23
  */
24
24
  "blockTraffic"?: boolean;
25
25
  /**
26
26
  * Defined tags for this resource. Each key is predefined and scoped to a namespace.
27
- * Example: `{\"foo-namespace\": {\"bar-key\": \"value\"}}`
27
+ * Example: {@code {\"foo-namespace\": {\"bar-key\": \"value\"}}}
28
28
  *
29
29
  */
30
30
  "definedTags"?: {
@@ -40,7 +40,7 @@ export interface UpdateServiceGatewayDetails {
40
40
  "displayName"?: string;
41
41
  /**
42
42
  * Simple key-value pair that is applied without any predefined name, type or scope. Exists for cross-compatibility only.
43
- * Example: `{\"bar-key\": \"value\"}`
43
+ * Example: {@code {\"bar-key\": \"value\"}}
44
44
  *
45
45
  */
46
46
  "freeformTags"?: {
@@ -54,15 +54,15 @@ export interface UpdateServiceGatewayDetails {
54
54
  */
55
55
  "routeTableId"?: string;
56
56
  /**
57
- * List of all the `Service` objects you want enabled on this service gateway. Sending an empty list
57
+ * List of all the {@code Service} objects you want enabled on this service gateway. Sending an empty list
58
58
  * means you want to disable all services. Omitting this parameter entirely keeps the
59
59
  * existing list of services intact.
60
60
  * <p>
61
- You can also enable or disable a particular `Service` by using
61
+ You can also enable or disable a particular {@code Service} by using
62
62
  * {@link #attachServiceId(AttachServiceIdRequest) attachServiceId} or
63
63
  * {@link #detachServiceId(DetachServiceIdRequest) detachServiceId}.
64
64
  * <p>
65
- For each enabled `Service`, make sure there's a route rule with the `Service` object's `cidrBlock`
65
+ For each enabled {@code Service}, make sure there's a route rule with the {@code Service} object's {@code cidrBlock}
66
66
  * as the rule's destination and the service gateway as the rule's target. See
67
67
  * {@link RouteTable}.
68
68
  *
@@ -15,7 +15,7 @@ documentation for the [Network Path Analyzer](/iaas/Content/Network/Concepts/pat
15
15
  export interface UpdateSubnetDetails {
16
16
  /**
17
17
  * Defined tags for this resource. Each key is predefined and scoped to a namespace.
18
- * Example: `{\"foo-namespace\": {\"bar-key\": \"value\"}}`
18
+ * Example: {@code {\"foo-namespace\": {\"bar-key\": \"value\"}}}
19
19
  *
20
20
  */
21
21
  "definedTags"?: {
@@ -36,7 +36,7 @@ export interface UpdateSubnetDetails {
36
36
  "displayName"?: string;
37
37
  /**
38
38
  * Simple key-value pair that is applied without any predefined name, type or scope. Exists for cross-compatibility only.
39
- * Example: `{\"bar-key\": \"value\"}`
39
+ * Example: {@code {\"bar-key\": \"value\"}}
40
40
  *
41
41
  */
42
42
  "freeformTags"?: {
@@ -60,13 +60,13 @@ export interface UpdateSubnetDetails {
60
60
  * <p>
61
61
  - Must be valid.
62
62
  * - The CIDR block's IP range must be completely within one of the VCN's CIDR block ranges.
63
- * - The old and new CIDR block ranges must use the same network address. Example: `10.0.0.0/25` and `10.0.0.0/24`.
63
+ * - The old and new CIDR block ranges must use the same network address. Example: {@code 10.0.0.0/25} and {@code 10.0.0.0/24}.
64
64
  * - Must contain all IP addresses in use in the old CIDR range.
65
65
  * - The new CIDR range's broadcast address (last IP address of CIDR range) must not be an IP address in use in the old CIDR range.
66
66
  * <p>
67
67
  **Note:** If you are changing the CIDR block, you cannot create VNICs or private IPs for this resource while the update is in progress.
68
68
  * <p>
69
- Example: `172.16.0.0/16`
69
+ Example: {@code 172.16.0.0/16}
70
70
  *
71
71
  */
72
72
  "cidrBlock"?: string;
@@ -79,7 +79,7 @@ export interface UpdateSubnetDetails {
79
79
  a. The IPv6 CIDR block is valid and correctly formatted.
80
80
  * b. The IPv6 CIDR is within the parent VCN IPv6 range.
81
81
  * <p>
82
- Example: `2001:0db8:0123:1111::/64`
82
+ Example: {@code 2001:0db8:0123:1111::/64}
83
83
  *
84
84
  */
85
85
  "ipv6CidrBlock"?: string;
@@ -15,7 +15,7 @@ documentation for the [Network Path Analyzer](/iaas/Content/Network/Concepts/pat
15
15
  export interface UpdateVcnDetails {
16
16
  /**
17
17
  * Defined tags for this resource. Each key is predefined and scoped to a namespace.
18
- * Example: `{\"foo-namespace\": {\"bar-key\": \"value\"}}`
18
+ * Example: {@code {\"foo-namespace\": {\"bar-key\": \"value\"}}}
19
19
  *
20
20
  */
21
21
  "definedTags"?: {
@@ -31,7 +31,7 @@ export interface UpdateVcnDetails {
31
31
  "displayName"?: string;
32
32
  /**
33
33
  * Simple key-value pair that is applied without any predefined name, type or scope. Exists for cross-compatibility only.
34
- * Example: `{\"bar-key\": \"value\"}`
34
+ * Example: {@code {\"bar-key\": \"value\"}}
35
35
  *
36
36
  */
37
37
  "freeformTags"?: {
@@ -34,29 +34,29 @@ export interface UpdateVirtualCircuitDetails {
34
34
  "crossConnectMappings"?: Array<model.CrossConnectMapping>;
35
35
  /**
36
36
  * The routing policy sets how routing information about the Oracle cloud is shared over a public virtual circuit.
37
- * Policies available are: `ORACLE_SERVICE_NETWORK`, `REGIONAL`, `MARKET_LEVEL`, and `GLOBAL`.
37
+ * Policies available are: {@code ORACLE_SERVICE_NETWORK}, {@code REGIONAL}, {@code MARKET_LEVEL}, and {@code GLOBAL}.
38
38
  * See [Route Filtering](https://docs.cloud.oracle.com/iaas/Content/Network/Concepts/routingonprem.htm#route_filtering) for details.
39
39
  * By default, routing information is shared for all routes in the same market.
40
40
  *
41
41
  */
42
42
  "routingPolicy"?: Array<UpdateVirtualCircuitDetails.RoutingPolicy>;
43
43
  /**
44
- * Set to `ENABLED` (the default) to activate the BGP session of the virtual circuit, set to `DISABLED` to deactivate the virtual circuit.
44
+ * Set to {@code ENABLED} (the default) to activate the BGP session of the virtual circuit, set to {@code DISABLED} to deactivate the virtual circuit.
45
45
  *
46
46
  */
47
47
  "bgpAdminState"?: UpdateVirtualCircuitDetails.BgpAdminState;
48
48
  /**
49
- * Set to `true` to enable BFD for IPv4 BGP peering, or set to `false` to disable BFD. If this is not set, the default is `false`.
49
+ * Set to {@code true} to enable BFD for IPv4 BGP peering, or set to {@code false} to disable BFD. If this is not set, the default is {@code false}.
50
50
  *
51
51
  */
52
52
  "isBfdEnabled"?: boolean;
53
53
  /**
54
- * Set to `true` for the virtual circuit to carry only encrypted traffic, or set to `false` for the virtual circuit to carry unencrypted traffic. If this is not set, the default is `false`.
54
+ * Set to {@code true} for the virtual circuit to carry only encrypted traffic, or set to {@code false} for the virtual circuit to carry unencrypted traffic. If this is not set, the default is {@code false}.
55
55
  *
56
56
  */
57
57
  "isTransportMode"?: boolean;
58
58
  /**
59
- * Deprecated. Instead use `customerAsn`.
59
+ * Deprecated. Instead use {@code customerAsn}.
60
60
  * If you specify values for both, the request will be rejected.
61
61
  * Note: Numbers greater than Number.MAX_SAFE_INTEGER will result in rounding issues.
62
62
  */
@@ -79,7 +79,7 @@ export interface UpdateVirtualCircuitDetails {
79
79
  "customerAsn"?: number;
80
80
  /**
81
81
  * Defined tags for this resource. Each key is predefined and scoped to a namespace.
82
- * Example: `{\"foo-namespace\": {\"bar-key\": \"value\"}}`
82
+ * Example: {@code {\"foo-namespace\": {\"bar-key\": \"value\"}}}
83
83
  *
84
84
  */
85
85
  "definedTags"?: {
@@ -95,7 +95,7 @@ export interface UpdateVirtualCircuitDetails {
95
95
  "displayName"?: string;
96
96
  /**
97
97
  * Simple key-value pair that is applied without any predefined name, type or scope. Exists for cross-compatibility only.
98
- * Example: `{\"bar-key\": \"value\"}`
98
+ * Example: {@code {\"bar-key\": \"value\"}}
99
99
  *
100
100
  */
101
101
  "freeformTags"?: {
@@ -15,7 +15,7 @@ documentation for the [Network Path Analyzer](/iaas/Content/Network/Concepts/pat
15
15
  export interface UpdateVlanDetails {
16
16
  /**
17
17
  * Defined tags for this resource. Each key is predefined and scoped to a namespace.
18
- * Example: `{\"foo-namespace\": {\"bar-key\": \"value\"}}`
18
+ * Example: {@code {\"foo-namespace\": {\"bar-key\": \"value\"}}}
19
19
  *
20
20
  */
21
21
  "definedTags"?: {
@@ -31,7 +31,7 @@ export interface UpdateVlanDetails {
31
31
  "displayName"?: string;
32
32
  /**
33
33
  * Simple key-value pair that is applied without any predefined name, type or scope. Exists for cross-compatibility only.
34
- * Example: `{\"bar-key\": \"value\"}`
34
+ * Example: {@code {\"bar-key\": \"value\"}}
35
35
  *
36
36
  */
37
37
  "freeformTags"?: {
@@ -55,7 +55,7 @@ export interface UpdateVlanDetails {
55
55
  * <p>
56
56
  - Must be valid.
57
57
  * - The CIDR block's IP range must be completely within one of the VCN's CIDR block ranges.
58
- * - The old and new CIDR block ranges must use the same network address. Example: `10.0.0.0/25` and `10.0.0.0/24`.
58
+ * - The old and new CIDR block ranges must use the same network address. Example: {@code 10.0.0.0/25} and {@code 10.0.0.0/24}.
59
59
  * - Must contain all IP addresses in use in the old CIDR range.
60
60
  * - The new CIDR range's broadcast address (last IP address of CIDR range) must not be an IP address in use in the old CIDR range.
61
61
  * <p>
@@ -15,7 +15,7 @@ documentation for the [Network Path Analyzer](/iaas/Content/Network/Concepts/pat
15
15
  export interface UpdateVnicDetails {
16
16
  /**
17
17
  * Defined tags for this resource. Each key is predefined and scoped to a namespace.
18
- * Example: `{\"foo-namespace\": {\"bar-key\": \"value\"}}`
18
+ * Example: {@code {\"foo-namespace\": {\"bar-key\": \"value\"}}}
19
19
  *
20
20
  */
21
21
  "definedTags"?: {
@@ -31,7 +31,7 @@ export interface UpdateVnicDetails {
31
31
  "displayName"?: string;
32
32
  /**
33
33
  * Simple key-value pair that is applied without any predefined name, type or scope. Exists for cross-compatibility only.
34
- * Example: `{\"bar-key\": \"value\"}`
34
+ * Example: {@code {\"bar-key\": \"value\"}}
35
35
  *
36
36
  */
37
37
  "freeformTags"?: {
@@ -40,7 +40,7 @@ export interface UpdateVnicDetails {
40
40
  /**
41
41
  * The hostname for the VNIC's primary private IP. Used for DNS. The value is the hostname
42
42
  * portion of the primary private IP's fully qualified domain name (FQDN)
43
- * (for example, `bminstance1` in FQDN `bminstance1.subnet123.vcn1.oraclevcn.com`).
43
+ * (for example, {@code bminstance1} in FQDN {@code bminstance1.subnet123.vcn1.oraclevcn.com}).
44
44
  * Must be unique across all VNICs in the subnet and comply with
45
45
  * [RFC 952](https://tools.ietf.org/html/rfc952) and
46
46
  * [RFC 1123](https://tools.ietf.org/html/rfc1123).
@@ -59,7 +59,7 @@ export interface UpdateVnicDetails {
59
59
  * an empty array removes the VNIC from all network security groups.
60
60
  * <p>
61
61
  If the VNIC belongs to a VLAN as part of the Oracle Cloud VMware Solution (instead of
62
- * belonging to a subnet), the value of the `nsgIds` attribute is ignored. Instead, the
62
+ * belonging to a subnet), the value of the {@code nsgIds} attribute is ignored. Instead, the
63
63
  * VNIC belongs to the NSGs that are associated with the VLAN itself. See {@link Vlan}.
64
64
  * <p>
65
65
  For more information about NSGs, see
@@ -69,14 +69,14 @@ export interface UpdateVnicDetails {
69
69
  "nsgIds"?: Array<string>;
70
70
  /**
71
71
  * Whether the source/destination check is disabled on the VNIC.
72
- * Defaults to `false`, which means the check is performed. For information about why you would
72
+ * Defaults to {@code false}, which means the check is performed. For information about why you would
73
73
  * skip the source/destination check, see
74
74
  * [Using a Private IP as a Route Target](https://docs.cloud.oracle.com/iaas/Content/Network/Tasks/managingroutetables.htm#privateip).
75
75
  * <p>
76
76
  If the VNIC belongs to a VLAN as part of the Oracle Cloud VMware Solution (instead of
77
- * belonging to a subnet), the value of the `skipSourceDestCheck` attribute is ignored.
77
+ * belonging to a subnet), the value of the {@code skipSourceDestCheck} attribute is ignored.
78
78
  * This is because the source/destination check is always disabled for VNICs in a VLAN.
79
- * Example: `true`
79
+ * Example: {@code true}
80
80
  *
81
81
  */
82
82
  "skipSourceDestCheck"?: boolean;
@@ -18,7 +18,7 @@ documentation for the [Network Path Analyzer](/iaas/Content/Network/Concepts/pat
18
18
  export interface UpdateVtapDetails {
19
19
  /**
20
20
  * Defined tags for this resource. Each key is predefined and scoped to a namespace.
21
- * Example: `{\"foo-namespace\": {\"bar-key\": \"value\"}}`
21
+ * Example: {@code {\"foo-namespace\": {\"bar-key\": \"value\"}}}
22
22
  *
23
23
  */
24
24
  "definedTags"?: {
@@ -34,7 +34,7 @@ export interface UpdateVtapDetails {
34
34
  "displayName"?: string;
35
35
  /**
36
36
  * Simple key-value pair that is applied without any predefined name, type or scope. Exists for cross-compatibility only.
37
- * Example: `{\"bar-key\": \"value\"}`
37
+ * Example: {@code {\"bar-key\": \"value\"}}
38
38
  *
39
39
  */
40
40
  "freeformTags"?: {
@@ -71,10 +71,10 @@ export interface UpdateVtapDetails {
71
71
  */
72
72
  "vxlanNetworkIdentifier"?: number;
73
73
  /**
74
- * Used to start or stop a `Vtap` resource.
74
+ * Used to start or stop a {@code Vtap} resource.
75
75
  * <p>
76
- * `TRUE` directs the VTAP to start mirroring traffic.
77
- * * `FALSE` (Default) directs the VTAP to stop mirroring traffic.
76
+ * {@code TRUE} directs the VTAP to start mirroring traffic.
77
+ * * {@code FALSE} (Default) directs the VTAP to stop mirroring traffic.
78
78
  *
79
79
  */
80
80
  "isVtapEnabled"?: boolean;
@@ -18,7 +18,7 @@ documentation for the [Network Path Analyzer](/iaas/Content/Network/Concepts/pat
18
18
  */
19
19
  export interface UpgradeStatus {
20
20
  /**
21
- * The `drgId` of the upgraded DRG.
21
+ * The {@code drgId} of the upgraded DRG.
22
22
  *
23
23
  */
24
24
  "drgId": string;
@@ -35,7 +35,7 @@ export interface Vcn {
35
35
  /**
36
36
  * Deprecated. The first CIDR IP address from cidrBlocks.
37
37
  * <p>
38
- Example: `172.16.0.0/16`
38
+ Example: {@code 172.16.0.0/16}
39
39
  *
40
40
  */
41
41
  "cidrBlock": string;
@@ -63,7 +63,7 @@ export interface Vcn {
63
63
  "defaultSecurityListId"?: string;
64
64
  /**
65
65
  * Defined tags for this resource. Each key is predefined and scoped to a namespace.
66
- * Example: `{\"foo-namespace\": {\"bar-key\": \"value\"}}`
66
+ * Example: {@code {\"foo-namespace\": {\"bar-key\": \"value\"}}}
67
67
  *
68
68
  */
69
69
  "definedTags"?: {
@@ -80,7 +80,7 @@ export interface Vcn {
80
80
  /**
81
81
  * A DNS label for the VCN, used in conjunction with the VNIC's hostname and
82
82
  * subnet's DNS label to form a fully qualified domain name (FQDN) for each VNIC
83
- * within this subnet (for example, `bminstance1.subnet123.vcn1.oraclevcn.com`).
83
+ * within this subnet (for example, {@code bminstance1.subnet123.vcn1.oraclevcn.com}).
84
84
  * Must be an alphanumeric string that begins with a letter.
85
85
  * The value cannot be changed.
86
86
  * <p>
@@ -90,13 +90,13 @@ export interface Vcn {
90
90
  For more information, see
91
91
  * [DNS in Your Virtual Cloud Network](https://docs.cloud.oracle.com/iaas/Content/Network/Concepts/dns.htm).
92
92
  * <p>
93
- Example: `vcn1`
93
+ Example: {@code vcn1}
94
94
  *
95
95
  */
96
96
  "dnsLabel"?: string;
97
97
  /**
98
98
  * Simple key-value pair that is applied without any predefined name, type or scope. Exists for cross-compatibility only.
99
- * Example: `{\"bar-key\": \"value\"}`
99
+ * Example: {@code {\"bar-key\": \"value\"}}
100
100
  *
101
101
  */
102
102
  "freeformTags"?: {
@@ -119,18 +119,18 @@ export interface Vcn {
119
119
  /**
120
120
  * The date and time the VCN was created, in the format defined by [RFC3339](https://tools.ietf.org/html/rfc3339).
121
121
  * <p>
122
- Example: `2016-08-25T21:10:29.600Z`
122
+ Example: {@code 2016-08-25T21:10:29.600Z}
123
123
  *
124
124
  */
125
125
  "timeCreated"?: Date;
126
126
  /**
127
127
  * The VCN's domain name, which consists of the VCN's DNS label, and the
128
- * `oraclevcn.com` domain.
128
+ * {@code oraclevcn.com} domain.
129
129
  * <p>
130
130
  For more information, see
131
131
  * [DNS in Your Virtual Cloud Network](https://docs.cloud.oracle.com/iaas/Content/Network/Concepts/dns.htm).
132
132
  * <p>
133
- Example: `vcn1.oraclevcn.com`
133
+ Example: {@code vcn1.oraclevcn.com}
134
134
  *
135
135
  */
136
136
  "vcnDomainName"?: string;
@@ -20,14 +20,14 @@ export interface VirtualCircuitBandwidthShape {
20
20
  /**
21
21
  * The bandwidth in Mbps.
22
22
  * <p>
23
- Example: `10000`
23
+ Example: {@code 10000}
24
24
  * Note: Numbers greater than Number.MAX_SAFE_INTEGER will result in rounding issues.
25
25
  */
26
26
  "bandwidthInMbps"?: number;
27
27
  /**
28
28
  * The name of the bandwidth shape.
29
29
  * <p>
30
- Example: `10 Gbps`
30
+ Example: {@code 10 Gbps}
31
31
  *
32
32
  */
33
33
  "name": string;
@@ -20,7 +20,7 @@ export interface VirtualCircuitDrgAttachmentNetworkDetails extends model.DrgAtta
20
20
  /**
21
21
  * Boolean flag that determines wether all traffic over the virtual circuits is encrypted.
22
22
  * <p>
23
- Example: `true`
23
+ Example: {@code true}
24
24
  *
25
25
  */
26
26
  "transportOnlyMode"?: boolean;
@@ -26,8 +26,8 @@ export interface VirtualCircuitPublicPrefix {
26
26
  /**
27
27
  * Oracle must verify that the customer owns the public IP prefix before traffic
28
28
  * for that prefix can flow across the virtual circuit. Verification can take a
29
- * few business days. `IN_PROGRESS` means Oracle is verifying the prefix. `COMPLETED`
30
- * means verification succeeded. `FAILED` means verification failed and traffic for
29
+ * few business days. {@code IN_PROGRESS} means Oracle is verifying the prefix. {@code COMPLETED}
30
+ * means verification succeeded. {@code FAILED} means verification failed and traffic for
31
31
  * this prefix will not flow across the connection.
32
32
  *
33
33
  */